Red HatThis forum is for the discussion of Red Hat Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
So why do we have that restriction on kernels on the RH website?
Quote:
The flaw identified by CVE-2010-3081 describes an issue in the 32/64-bit compatibility layer implementation in the Linux kernel, versions 2.6.26-rc1 to 2.6.36-rc4.
Doesn't it mean we use the 32b emulator, that may not have the flaw?
Distribution: Slackware 13.37 (64-bit on desktop, 32-bit on netbook)
Posts: 17
Rep:
Red Hat uses older kernels than a lot of distributions and then patches them. The kernel you're using (2.6.18) was first released in 2006 and would not be effected by this unless Red Hat patched the problem in later. Which, from reading their security notice it looks like they DID.
Quote:
Originally Posted by Red Hat
Red Hat Enterprise Linux 5
This issue affects the 64-bit versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, as they include a backport of the upstream git commit 42908c69, which introduced the compat_mc_getsockopt() function that a local, unprivileged user can use to abuse the compat_alloc_user_space() call to escalate their privileges.
So you'll need to apply the update from Red Hat to fix this. It's also mentioned on that page.
Quote:
Originally Posted by Red Hat
Solution
This issue has been fixed in Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 5.4 Extended Update Support via the Red Hat Security Advisories RHSA-2010:0704 and RHSA-2010:0705 respectively. Future updates will address this issue for Red Hat Enterprise Linux 4 and Red Hat Enterprise MRG.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.